Cyber Security Budgets Are Misspent

A leading cyber security services company, Integrity360, has announced its findings from a Twitter poll to gain visibility into cyber security budgets and over surplus solutions within businesses. Their conclusion is that almost 30% of polled businesses have between 31-40 tools that are not required in their tech stack  

The poll, which was conducted between 8-10 March, found that over 30% of businesses believe that 30% of their budget is being allocated to tools and solutions that are not being used to their full potential.  

In addition, almost 30% of those surveyed agree that they have more than 31-40 tools and solutions within their tech stack that could be removed due to overlapping and unused features. This is a worrying figure when cyber security breaches continue to rise, and businesses are left with gaps that could give cyber attackers a route in. 

The CTO of Integrity360, Richard Ford, commented: “Whilst businesses recognise the need to allocate more budget towards cyber security, the difficulty lies in knowing where to apportion the spend...  It’s easy to throw money at all the shiny new tech and solutions on the market, but this results in disparate systems, with too many tools deployed for specific purposes, that ultimately go unmanaged and underutilised.” 

Furthermore, 46% of polled respondents believe the most damaging impact of a cyber security breach to be the consequential financial damage.

“Businesses need a cyber security strategy that provides full visibility over their tech stack and the solutions they have, those they need and those they can do without... An overabundance of solutions with features that overlap or aren’t required, is an accident waiting to happen, and a drain on budget and efficiency”, Ford commented. 

At a time of economic downturn when cyber security budgets are tight and risks are heightened, spending money on unnecessary and unused solutions is a business risk. Action to get rid of outdated systems, to consolidate different platforms and convergence of technologies us the best way optimise spending as well as improving overall security posture, according to Ford. 

 

You Might Also Read: 

Many Cyber Security Experts Don’t Understand The Systems They Are Trying To Secure:

___________________________________________________________________________________________

If you like this website and use the comprehensive 6,500-plus service supplier Directory, you can get unrestricted access, including the exclusive in-depth Directors Report series, by signing up for a Premium Subscription.

  • Individual £5 per month or £50 per year. Sign Up
  • Multi-User, Corporate & Library Accounts Available on Request

Cyber Security Intelligence: Captured Organised & Accessible


 

 

« World Backup Day 
Bitbucket Backup Methods »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Cyber Security Supplier Directory

Cyber Security Supplier Directory

Our Supplier Directory lists 6,000+ specialist cyber security service providers in 128 countries worldwide. IS YOUR ORGANISATION LISTED?

Convercent

Convercent

We offer comprehensive and integrated compliance management, reporting, and analytics. A 360-degree view of compliance drives efficiency by aligning initiatives and data into a single dashboard.

Managed Security Solutions (MSS)

Managed Security Solutions (MSS)

MSS deliver consultancy services and managed security services for IT departments who may lack the time, resources, or expertise themselves.

Ubiq Security

Ubiq Security

Ubiq has developed a software solution that secures any type of data, on any device, anywhere, with nearly no impact to system performance or user experience.

Tesorion

Tesorion

Tesorion is a fusion of different enterprises each with its own specialisation in the field of cybersecurity. We have combined these specialisations to create an integrated comprehensive solution.

Seekurity

Seekurity

Seekurity is an information security consulting firm specialized in all areas of Cyber Security including Penetration Testing, Vulnerability Assessments and Risk Management.

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS)

Women in CyberSecurity (WiCyS) is a non-profit organization dedicated to the recruitment, retention and advancement of women in the cybersecurity field.

Early Birds

Early Birds

Early Birds is a Business to Business (B2B) marketplace for Innovators (Startups/Scaleups) and Early Adopters to exchange value early on.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

GoVanguard

GoVanguard

GoVanguard is an boutique information security team delivering robust, business-focused information security solutions.

IN4 Group

IN4 Group

IN4 Group is a skills, innovation and start-up services provider that specialises in supporting businesses with the training, communities, networks and advice they need to scale.

Mage Data

Mage Data

Mage (formerly Mentis Software) is a leading solutions provider for data security and data privacy software for global enterprises.

Ekco

Ekco

Ekco is one of Europe’s leading managed cloud providers. With a network of infrastructure and security specialists across Europe, we’ve perfected our approach to supporting digital transformation.

Axiata Digital Labs

Axiata Digital Labs

Axiata Digital Labs is the technology hub of Axiata Group Berhad Malaysia which is one of the leading groups in telecommunication in Asia.

Quarkslab

Quarkslab

Quarkslab is a dedicated team of cyber-security engineers and developers. We aim at forcing the attackers, not the defender, to adapt constantly.

dWallet Labs

dWallet Labs

dWallet Labs is a cybersecurity company specializing in blockchain technology. We believe that the future of Web3 relies on cutting edge cryptography and unabated security.

Domotz

Domotz

Domotz enables IT teams to monitor and manage their networks remotely, while ensuring that the security and the operational efficiency of their organizations are properly maintained.